Issues For Real Time Multimedia Communications

Print   

02 Nov 2017

Disclaimer:
This essay has been written and submitted by students and is not an example of our work. Please click this link to view samples of our professional work witten by our professional essay writers. Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of EssayCompany.

J. A. Stine and G. Veciana [30] argued that an appropriate paradigm should match the physics of the network. The critical resource is electromagnetic spectrum in a space; in turn, this result in a complex paradigm since the part of the spectrum-space that each node wants to use is unique to that node and its destination and will overlap with parts that other nodes may want to use creating interdependences among nodes. This paper describes protocol approaches for access and routing that seek solutions within this wireless paradigm. Access is arbitrated using synchronous signaling and topology is resolved through the dissemination of node states. This approach provides an intuitive framework that provides mechanisms that can be exploited to arbitrate RF media use and implement traffic engineering techniques to deliver QoS. Their proposed approach provides a novel way of tracking the state of the network that can serve as a unified state dissemination mechanism to simultaneously support routing, multicasting, and most QoS heuristics.

G. S. Ahn et.al [31] proposed SWAN (State Wide Area Network), a state less network model that utilizes spread control algorithms to distribute service delineation in mobile wireless ad hoc networks in a uncomplicated, scalable as well as robust mode. The researchers use rate control for UDP and TCP best-effort traffic, and sender-based admission control for UDP real-time traffic. SWAN uses explicit congestion notification (ECN) to energetically normalize admitted real- time traffic during the features of network dynamics transport on through mobility or traffic excess load circumstances. The researchers use the term "soft" real-time services to indicate that real-time sessions could be regulated or dropped due to mobility or excessive traffic overloading at mobile wireless routers. SWAN is designed to limit such conditions, however. A novel aspect of SWAN is that it does not require the support of a QOS-capable MAC. Rather, soft real-time services are built using existing best effort wireless MAC technology. Simulation, analysis, and results from an experimental wireless testbed show that real-time applications experience low and stable delays under various multi-hop, traffic and mobility conditions. The wireless testbed and ns-2 simulator source code are available from the Web (comet.columbia.edu/swan).

M. Saghir et.al [32] presented recently, multimedia and group-oriented computing become increasingly popular for the users of ad hoc networks. The study of QoS issues in MANETs is vital for supporting multimedia and real-time applications. MANETs can provide multimedia users with mobility they demand, if efficient QoS multicasting strategies were developed. In this paper, the researchers study QoS requirements, illustrate advantages and limitations of existing QoS routing protocol and propose a QoS Multicast Routing protocol (QMR) with a flexible hybrid scheme for QoS multicast routing. The hybrid scheme contains some mechanisms that provide fix-reservation and shared-reservation bandwidth to guarantee QoS multicast routing. The proposed protocol uses forward nodes to apply QoS multicast routing from source(s) to a group of destinations and support load balancing. Analysis results show the ability of QMR to exploit residual bandwidth efficiently without effect on the reserved bandwidth and provide a balance between performance gains and design complexity.

E. Royer and C. Perkins [33] proposed the multicast operation of the impromptu On-Demand Distance Vector (AODV) routing protocol (MAODV) is meant to be used through mobile nodes in an Adhoc network. It offers fast adaptation to dynamic link conditions, low process and recollection overhead, and short network consumption. It generates bi-directional communal multicast trees concerning multicast sources and receivers. These multicast trees are maintained as long as group members exist within the connected portion of the network. Each multicast group has a group leader whose responsibility is maintaining the group sequence number, which is used to ensure freshness of routing information.

Y. Yi, S. Lee et.al [34] presented a unique multicast routing protocol for mobile impromptu wireless networks. The protocol, termed ODMRP (on-demand multicast routing protocol), may be a mesh-based, instead of a traditional tree-based multicast theme and uses a forwarding cluster thought (merely a set of nodes forwards the multicast packets through scoped overflow). It pertain on-demand procedures to energetically construct routes and preserve multicast gather membership. ODMRP is compatible for impromptu wireless networks with mobile hosts wherever information measure is proscribed, topology changes overtimes, and power is strained. The researchers valuate ODMRP is quantifiability and performance using simulation.

Y. Chen and Y. ko [35] proposed a lantern-tree-based QoS multicast protocol with a reliable mechanism for wireless ad-hoc networks, where the MAC sublayer adopts the CDMA-over-TDMA channel model. In this paper, the researchers identify a lantern-tree for developing an on-demand QoS multicast protocol to satisfy certain bandwidth requirements from a source to a set of destination nodes. The lantern-tree serves as the multicast-tree. Their lantern-tree-based scheme offers a higher success rate to construct the QoS multicast tree due to using the lantern-tree. The lantern-tree is a tree whose sub-path is constituted by the lantern-path, where the lantern-path is a special multi-path structure. This greatly improves the success rate by means of multi-path routing. In particular, their proposed scheme can be easily applied to most existing on-demand multicast protocols. Performance analysis results demonstrate the QoS achievements of their proposed protocol.

H. Tebbe, and A. Kassler [36] presented Mobile Ad-hoc networking has been considered as one of the most important and essential technologies that support future Pervasive Computing Scenarios and 4G networks. In a mobile Ad-hoc Network (MANET), support for multicast communication is essential in order to minimize overhead for group communication. For group conferencing services, controlling the end-to-end delay is important to provide high quality communication. In this paper, the researchers present QAMNet, an approach to improve the Quality of Service (QoS) for multicast communication in MANETs. The researchers extend existing approaches of mesh based multicasting by introducing traffic prioritization, distributed resource probing and admission control mechanisms, adaptive rate control of non-real-time traffic based on Medium Access Control (MAC) layer feedback so as to maintain low delay and required throughput for real-time multicast flows. Simulation results show that their approach is as scalable as mesh based deliver structures and does not require significantly more states than normal mesh based multicasting protocols. As they reuse signaling packets of mesh based multicast packets, they do not introduce additional signaling overhead.

K. Xu et.al [37] proposed QoS-Quality of service stipulation within wireless ad hoc networks theater an essential division in influential the achievement of network-centric conflict as visualization in future forces operations. It necessitates high-quality scalability of the QoS structural design while ad hoc networks inside the battleground have a tendency to be huge. Earlier effort attacking QoS in ad hoc networks rarely reflect on the scalability problems. In this research work, the researchers recommend a scalable QoS structural design for such networks. The researcher’s methods illustrated upon the optimistic portion of equally IntServ with DiffServ, as well as expand ahead the scalable LANMAR routing protocol hold up Quality of Service. The method is also competent of integrated mobile backbone networks (MBNs) to additional progress on the scalability. Reproduction outcome demonstrated that the projected Quality of Service structural design can accomplish a excellent scalability in conditions of huge network dimension as well as mobility.

S. Sivavakeesar and G. Pavlou [38] proposed Real-time multimedia applications necessitate predictable network resources. Quality of service (QoS) support for such applications in mobile ad hoc networks (MANETs) requires acceptable channel conditions, QoS-aware mechanisms for channel access, identification of proper forwarding (transit) nodes, as well as measures for congestion prevention and management in those nodes. This paper proposes a new QoS-aware medium access control (MAC) protocol that takes the above requirements into consideration. This novel protocol is based on the legacy IEEE 802.11, and thus can be easily integrated into existing systems without much difficulty. Simulation results confirm that their approach results in improved throughput for real-time periodic traffic, while providing deterministic delay performance.

H. Jiang et.al [39] presented Cross-layer design approaches are critical for efficient utilization of the scarce radio resources with QoS provisioning in the third-generation wireless networks and beyond. Better system performance can be obtained from information exchanges across protocol layers, which may not be available in the traditional layering architecture. This article provides an overview of cross-layer design approaches for resource allocation in 3G CDMA networks, summarizes state-of-the-art research results, and suggests further research issues. In addition, a cross-layer design approach for real-time video over time-varying CDMA channels is proposed, where link layer resource allocation benefits from information in both the application and physical layers. Simulations results are given to display the efficiency of the projected approach.

Prasad, R., Murray et.al [40] presented in an incredibly packet network, the terms information measure and outturn usually characterize the number of information that the network will transfer per unit of your time. Bandwidth estimation is of interest to users desire to optimize end-to-end transport presentation, overlay network routing, as well as peer-to-peer file allocation. Techniques for correct information measure estimation are necessary for traffic engineering and capability designing support. Obtainable Bandwidth estimation tools measure one or a lot of 3 connected metrics: capability, offered information measure, and bulk transfer capability. Presently offered information Bandwidth estimation tools use a range of methods to live these metrics. During this survey the researchers review the recent information measure estimation literature specializing in underlying techniques and methodologies moreover as open supply information measure tools.

Jain, M. and Dovrolis, C [41] first review the previous work in the area and classify the existing techniques in two classes: direct probing and iterative probing. The researchers then identify ten misconceptions, in the form of fallacies or pitfalls, which the researchers consider as most important. Some misconceptions relate to basic statistics, such as the impact of the population variance on the sample mean, the variability of the avail-bw in different time scales, and the effect of the probing duration. Other misconceptions relate to the queueing model underlying these estimation techniques. For instance, ignoring that traffic burstiness or the presence of multiple bottlenecks can cause significant underestimation errors. Their objective is not to debunk previous work or to claim that some estimation techniques are better than others, but to clarify a number of important issues that cover the entire area of avail-bw estimation so that this important metric can be better understood and put in practical use.

Nahrstedt, K., Shah et.al [42] presented bandwidth scarce and variable resource in all types of wireless networks. Tracking the available bandwidth and having all applications using the wireless channel adapt their quality of service (QoS) to the available bandwidth is a complex procedure. It requires several adjustments at each layer of the OSI protocol stack. Moreover, the procedures at each layer of the stack must co-operatively interact with those at the other to ensure maximum satisfaction for users. In this survey, the researchers picked six approaches that each adopt such a cross-layer approach towards monitoring and adapting to the variable channel capacity. They briefly described the salient features of the six architectures and compared and contrasted the methods they employ at each layer of the protocol stack. They also give their views on future directions in cross-layer design for bandwidth management in wireless networks.

V.Ribeiro et.al [43] presented pathChirp, a replacement active inquisitor tool for estimating the out there information measure on a communication network path. Supported the conception of "self-induced congestion" pathChirp options associate exponential flight pattern of probes the researchers decision a chirp. Packet chips supply many important benefits over current inquisitor schemes supported packet pairs or packet trains. Through speedily increasing the inquisitor rate inside every chirp, pathChirp obtains a fashionable set of data from that to dynamically estimate the out there information measure. Since it uses solely packet inter arrival times for estimation, pathChirp doesn't need synchronous nor extremely stable clocks at the sender and receiver. The researchers take a look at pathChirp with simulations and web experiments and realize that it provides sensible estimates of the out there information measure whereas victimization solely a fraction of the amount of probe bytes that current state of -the-art techniques used.

Hu, N. and Steenkiste, P. [44] proposed packet try mechanism has been shown to be a reliable methodology to live the bottleneck link capability on a network path however its use for activity obtainable information measure is more difficult. During this paper, the researchers use modeling, measurements, and simulations to characterize the interaction between searching packets and also the competing network traffic. The researchers initially constructed a straightforward model to grasp however competing traffic changes the searching packet gap for a single-hop network. The gap model shown that the initial searching gap could be an essential parameter once persecution packet pairs to estimate obtainable information bandwidth. Based on this insight, they gift 2 out there information measure measuring techniques, the initial gap increasing (IGI) technique and therefore the packet transmission rate (PTR) technique. The researchers use in depth web measurements to indicate that these techniques estimate out there information measure quicker than existing techniques like Path load, with comparable accuracy. Finally, persecution each web measurements and ns simulations, the researchers explore however the measuring accuracy of active inquiring is stricken by factors like the inquiring packet size, the length of inquiring packet train, and therefore the competitive traffic on links aside from the tight link.

K. Lai and M.Baker [45] described a deterministic model of packet delay and use it to derive both the packet pair property of FIFO-queueing networks and a new technique (packet tailgating) for actively measuring link bandwidths. Compared to previously known techniques, packet tailgating usually consumes less network bandwidth, does not rely on consistent behavior of routers handling ICMP packets, and does not rely on timely delivery of acknowledgments. Preliminary empirical measurements in the Internet indicate that compared to current measurement tools, packet tailgating sends an order of magnitude fewer packets, while maintaining approximately the same accuracy. Unfortunately, for all currently available measurement tools, including their prototype implementation of packet tailgating, accuracy is low for paths longer than a few hops.

R. S. Prasad et.al [46] referred to as Variable Packet Size (VPS) probing. The key assumption in VPS is that each L3 hop along a path increases the delay of a packet by "serialization latency", which is the ratio of the packet size over that hop's capacity. Unfortunately, the capacity estimates of VPS tools are sometimes wrong. In this paper, the researchers investigate the source of these errors, and show that the presence of layer-2 (L2) store-and-forward devices, such as Ethernet switches, have a detrimental effect on the accuracy of VPS tools. Specifically, each L2 store-and-forward device introduces additional serialization latency in a packet's delay, which results in consistent underestimation of that L3 hop's capacity. The researchers analyze this negative effect, deriving the measured capacity of an L3 hop as a function of the L2 link capacities at that hop. Experimental results in local, campus, and ISP networks verify the model, illustrating that L2 devices should be expected in networks of diverse type and size. Finally, they characterize some other sources of error in VPS tools, such as queueing delays, limited clock resolution, variation in ICMP generation delays, and error propagation along the measured path.

M. Jain and C. Dovrolis [47] described Associate in end-to-end methodology, known as auto loading periodic streams (SLoPS), for measure avail-bw. The fundamental plan in SLoPS is that the unidirectional delays of a periodic packet stream show Associate in increasing trend once the stream's rate is the avail-bw. The researchers have enforced SLoPS in an exceedingly tool known as path load. The accurateness of the implement has been estimated with all simulations and experiments over real-world net methods. Path load is nonintrusive, which means that it doesn't cause important will increase within the network utilization, delays, or losses. The researchers used path load to adjudicator the inconsistency ("dynamics") of the avail-bw in net schemes. The avail-bw becomes considerably a lot of variable in heavily used methods, also as in methods with restricted capability (probably owing to a lower degree of applied math multiplexing). The researchers lastly examined the relation between avail-bw and protocol outturn. A persistent protocol affiliation is wont to live roughly the avail-bw in an exceedingly path however protocol saturates the trail and will increase considerably the trail delays and disturbance.

B. Melander et.al [48] presented a network friendly bandwidth measurement method, TOPP, that is based on active probing and includes analysis by segmented regression. This method can estimate two complementing available bandwidth metrics in addition to the link bandwidth of the congested link. Contrary to traditional packet pair estimates of the bottleneck link bandwidth, their estimate is not limited by the rate at which the researchers can inject probe packets into the network. The researchers also show that their method is able to detect bottlenecks that are invisible to methods such as the C-probe. Further more, the researchers describe scenarios where their analysis method is able to calculate bandwidth estimates for several congested hops based on a single end-to-end probe session.

B. Melander, M. et.al [49] presented a method for estimating the available bandwidth of a network path. It is an extension and enhancement of the bandwidth measurement method TOPP. TOPP actively probes a network path by sending probe packets in a predetermined time pattern. Their enhancement involves a formalized estimation algorithm based on constrained linear regression. Using the algorithm, bandwidth measurements can be fully automated requiring no assistance from the user. The researchers shown their method is able to estimate bottlenecks that cannot be detected by packet train methods such as C-probe. In addition to inferring the available bandwidth, the method gives an estimate of the link bandwidth of the most congested link on the network path. The link bandwidth estimates are not limited to the rate at which the researchers can inject probe packets into the network.

K. Harfoush, A. et.al [50] focused for 2 methods to determining bandwidth: calculating it hop by hop, as well as computing it end-to-end of a path. Unluckily best-practice techniques for the previous square measure inefficient and techniques for the latter square measure solely prepared to examine restricted accessed observable at end-to-end possibility. During this research, the researchers develop end-to-end inquisitor strategies which might live bottleneck information measure on discretionary, targeted sub paths of a path within the network, as well as sub paths shared by a collection of flows. The researchers judge their technique through intensive ns simulations, and then give a comparative web performance analysis against hop-by-hop techniques. The researchers additionally describe variety of applications that the researchers foresee as standing to profit from solutions to the present drawback, starting from network troubleshooting and capability stipulation to optimize the described of application intensity superimpose networks to optimized imitation placement.

K. Chen and K. Nahrstedt [51] proposed an explicit rate-based flow Control (EXACT) scheme as their solution, which relies on explicit bandwidth signaling from the routers to notify the end-hosts their allowed data sending rates. Each router computes the data rates for the flows currently passing through the router, and modifies the header of each packet to reflect the flows allowed sending rate. As a result, their EXACT scheme reacts quickly and precisely to re-routing and bandwidth fluctuation, which makes it especially suit- able for a dynamic MANET. The researchers also discuss practical deployment issues of their framework in MANET, and provide remedies for legacy applications. Their simulation results show that the EXACT flow control scheme is very effective even in a fast moving multi-hop MANET network, and is superior to the traditional AIMD algorithm in many aspects.

S. Khalfallah et.al [52] proposed a new cross-layer protocol named DRBT (dynamic regulation of Best Effort traffic) which supports QoS guarantees and provides a distributed regulation mechanism for Best Effort traffic in wireless ad hoc networks. By adapting the rate of best effort traffic at the MAC Layer, DRBT increases the acceptance rate of QoS flows through the network. The protocol also provides an accurate method to evaluate the obtainable bandwidth in IEEE 802 based an Adhoc network which differentiates between QoS applications and those which are less exigent in term of bandwidth more commonly called Best Effort traffic. Through simulations, the researchers compare the performance of their proposal scheme with AODV and ABE.

C. Chaudet and I. Gu´erin Lassous [53] dealed with the bandwidth reservation problem in ad hoc networks and with the influence that interferences between signals have on this problem. The researchers shown interferences might decrease the application accusation. This is able to be a genuine difficulty for applications that required assurance. The researchers propose a distributed protocol (called BRuIT) for bandwidth reservation in ad hoc networks that takes into account the existence of interferences from far transmissions. The protocol is analyzed through simulations carried out under NS: they evaluate the signaling overhead required for maintaining the knowledge of existing interferences; the researchers show that this knowledge reduces delays in case of congestion; the researchers measure the time for rebuilding broken routes; and finally the researchers show that this protocol maintains the rate of accepted applications.

A. Veres, A. Campbell et.al [54] investigated discriminate services in wireless packet networks exploiting a completely distributed approach which supports service delineation, radio monitoring, as well as entrance control. While their proposal is generally applicable to distributed wireless access schemes, the researchers design, implement, and evaluate their framework within the context of existing wireless technology. Service separation has based on the IEEE 802.11 distributed coordination function (DCF) formerly considered to hold up greatest attempt data services. The researchers analyze the delay experienced by a mobile host implementing the IEEE 802.11 DCF and derive a closed-form formula. They then extend the distributed coordination function to present service differentiation designed for impediment sensitive as well as most excellent exertion traffic stand on the results from the analysis. Two distributed estimation algorithms are proposed. These algorithms are evaluated using simulation, analysis, and experimentation. An effective MAC (VMAC) algorithm inactively monitors the radio channel and opinion locally attainable service levels. The VMAC approximation key MAC intensity statistics connected to service excellence like as delay, delay difference, packet accident, and packet defeat. The researchers showed the efficiency of the VMAC algorithm through simulation and regard as significantly overlapping cells as well as extremely burst traffic combines. In addition, the researchers implement and evaluate the VMAC in an experimental differentiated services wireless testbed. A virtual source (VS) algorithm utilizes the VMAC to estimate application-level service quality. The VS consent to application parameter to subsist tuned in reaction to dynamic channel circumstances support on "virtual delay curves." They demonstrate through simulation that when these distributed victual algorithms are appropriated to the admittance control of the radio channel afterward an internationally constant state is able to be maintained with no require for composite centralized radio reserve management.

H. Badis and K. Al Agha [55] described a new quality-of-service (QoS) routing protocol intended for ad hoc networks stand on the Optimized Link State Routing procedure. Their protocol, Quality Optimized Link State Routing, has been considered for wireless networks with stationary or else poignant nodes, wherever every node is prepared with 802.11 wireless cards. The objective of the protocol can not just to discover a route from a source toward a purpose, except an optimal route which satisfies the end-to-end QoS obligation, frequently given in conditions of bandwidth or delay. The researchers presented an investigative model to calculate the average delay and allowable throughput on relations using the IEEE 802.11 intermediate access protocol as well as considering associations as well as interferences among nodes. This model gets into explanation packet's collision probability, node's MAC lining and examine times stand on the IEEE 802.11 binary exponential reverse off algorithm with the proceedings underside its process. Subsequently, the protocol allocates weights to individual links stand on the average delay as well as bandwidth metrics of packets in excess of the link. The researchers presented a dispersed algorithm for numerous QoS requirements to discover the source reason mainly favorable paths in conditions of bandwidth and delay applying the identified incomplete network topology obtainable on every node. Though, these optimal paths in incomplete network topology have not most favorable paths in the entire ad hoc network. The researchers exposed this difficulty is owing to the heuristic for the collection of MPRs utilized in OLSR. The researchers recommend innovative heuristics for the assortment of MPRs bottom on QoS measurements that consent to QOLSR to locate best paths on the recognized partial topology contain the similar bandwidth performance to those on the complete network.

C. Chaudet and I. Gu´erin Lassous [56] deals with the bandwidth reservation problem in ad hoc networks and with the influence that interferences between signals have on this problem. The researchers shown interferences might drop off the applications rates. This is able to be a genuine difficulty for applications that require assurance. The researchers propose a distributed protocol (called BRuIT) for bandwidth reservation in ad hoc networks that takes into account the existence of interferences from far transmissions. The protocol is analyzed through simulations carried out under NS: the researchers evaluate the signaling overhead required for maintaining the knowledge of existing interferences ; the researchers show that this knowledge reduces delays in case of congestion ; they measure the time for rebuilding broken routes ; and finally the researchers show that this protocol maintains the rate of accepted applications.

Lan Tien Nguyen et.al [57] presented multi-hop wireless networks which provide a quick and easy way for networking when the researchers need a temporary network or when cabling is difficult. The 802.11 Medium Access Control (MAC) plays an important role in the achievable system performance. There have been many studies on analytic modeling of single-hop 802.11 wireless networks but only a few on the analysis of multihop wireless networks. Furthermore, the object of these researches is a homogeneous ad-hoc wireless network therefore they are not appropriate for a network with structure such as wireless mesh networks. This paper introduces an analytic model of throughput performance for the IEEE 802.11 multi-hop networks, which allows us to compute the achievable throughput on a given path in multi-hop wireless networks. The model shows that there is an optimal point at which throughput is maximized. Using this model and a Markov model for modeling the operation of the IEEE 802.11 DCF the researchers can determine the amount of data that each node should inject to the network to get the best throughput performance.

S. Keshav [58] presented a control theoretic method to immediate flow control within networks that does not preserve bandwidth. The researchers presupposed a round-robin as queue examine regulation in the production queue of the network’s switches, and recommend deterministic and stochastic models intended for a exacting conversation within a network of such switches. These models inspiration the Packet Pair rate inquisitive techniques and a demonstrably stable rate based flow management themes. A Kalman state calculator springs from discrete-time state house analysis, however there are difficulties in victimization the calculator in apply. These difficulties are overcome by a completely unique estimation theme supported symbolic logic. The researchers then gift a method to extract and use extra info horn the system to develop a continuous-time system model. This is often accustomed style a wuisnt of the management law that\'s additionally demonstrably stable, and, additionally, takes management action as quickly as attainable. Finally, sensible problems like correcting parameter drift and combination with window flow management are represented.

J. C. Bolot et.al [59] used the measured trip delays of tiny UDP probe packets sent at regular time intervals to characterize the end-to-end packet delay and loss behavior within the web. By variable the interval between probe packets, it's potential to check the structure of the net load over totally different time scales. During this paper, the time scales of interest vary from a couple of milliseconds to a couple of minutes. Their observations believe results obtained by others victimization simulation and experimental approaches. As an instance, their approximation of web work is according to the hypothesis of a combination of bulk traffic with huge packet size, as well as interactive traffic with lesser packet size. The inter arrival time distribution for Internet packets is consistent with an exponential distribution. The researchers also observe a phenomenon of compression (or clustering) of the probe packets similar to the acknowledgement compression phenomenon recently observed in TCP.

R. L. Carter and M. E. Crovella [60] presented the quality of available network connections can often have a large impact on the performance of distributed applications. For example, document transfer applications such as FTP, Gopher and the World Wide Web suffer increased response times as a result of network congestion. For these applications, the document transfer time is directly related to the available bandwidth of the connection. Available bandwidth depends on two things: 1) the underlying capacity of the path from client to server, which is limited by the bottleneck link; and 2) the amount of other traffic competing for links on the path. If measurements of these quantities were available to the application, the current utilization of connections could be calculated. Network utilization could then be use databases for selection from a set of alternative connections or servers, thus providing reduced response time. Such a dynamic server selection scheme would bee especially important in a mobile computing environment in which the set of available servers is frequently changing.

A. Pasztor and D. Veitch [61] provided a brand new delay variation based mostly route model that permits the principles of packet-pair to be formalized and extended. This allows the result of probe size to subsist evaluate, downstream sound understood, peak discovery identified as superior to mode or minimum based mostly filtering, and new estimation strategies to be projected and evaluated. Exploitation insight from the governing equations and simulation, it's shown however real measurements remodeled a twelve hop route will be taken. Surprising further probe size dependencies were found, ennobling associate degree extension of the route model to incorporate lower layer headers. It’s shown however the improved model accounts for the determined dependencies, permitting a lot of correct estimates and a bigger understanding of the role of cross traffic.

S. Banerjee and A. K. Agrawala [62] defined as well as measured the obtainable capability of a correlation, throughout explanation at endpoints merely. Their measurements account for the variability of cross traffic that passes by the routers management this association. Associated to the inference of obtainable capability, the researchers suggest modifications to current techniques to measure the package examine time of the "bottleneck" router of the relationship. Lastly, the researchers present estimation results on wide-area network connections from their experiments to multiple sites.

S. Alouf, P.Nain, and D. Towsley [63] developed simple inference models based on finite capacity single server queues for estimating the buffer size and the intensity of cross traffic at the bottleneck link of a path between two hosts. Several pairs of moment-based estimators are proposed to estimate these two quantities. The best scheme is then identified through simulation.

Ralph El-Khoury and Rachid [64] presented a model that takes into account topology, routing, random access in MAC layer and forwarding probability. The researchers propose a new approach (based on cycle of transmissions) to derive throughput of multi-hop routes and stability of forwarding queues. With this cycle approach, the researchers correct the analytical expressions derived in and discover that their results are valid only in particular cases such as symmetric networks. However, in this paper, they get extended results for general network case. Moreover, they conformed that (i) the forwarding queues in a system of weighted fair queues has a special property and (ii) the end to end throughput of a connection does not depend on the load of the intermediate forwarding queues between a source and a destination. The researchers perform extensive simulations and verify that the analytical results exactly match the results obtained from simulations.

Ping Chung Ng and Soung [65] shown that controlling the offered load at the sources can eliminate these problems. To verify the simulation results, the researchers set up a real 6-node multi-hop network. The experimental measurements confirm the existence of the optimal offered load. In addition, the researchers provide an analysis to estimate the optimal offered load that maximizes the throughput of a multi-hop traffic flow. We believe this is a first paper in the literature to provide a quantitative analysis (as opposed to simulation) for the impact of hidden nodes and signal capture on sustainable throughput. The analysis is based on the observation that a large-scale 802.11 network with hidden nodes is a network in which the carrier-sensing capability breaks down partially. Its performance is therefore somewhere between that of a carrier-sensing network and that of an Aloha network. Indeed, their analytical closed-form solution has the appearance of the throughput equation of the Aloha network. Their approach allows one to identify whether the performance of an 802.11 network is hidden-node limited or spatial-reuse limited

Feng Chen et.al [66] developed a hypothetical model intended for approximation the obtainable bandwidth of a pathway through considering intrusion from mutually environment traffic as well as traffic beside the path. The researchers exposed the clique restriction widely utilized to created upper bounds are not hold some additional when links will be allowable to use various rates at diverse instance. In the planned model, conventional clique is coupled with velocity vector to additional properly characterize the contradictory relations between links inside wireless ad hoc networks whereas moment changeable link adaptation has been used. Rest on this model, the researchers also explored the difficulty of combined optimization of QoS routing as well as link development. Some of routing metrics with a heuristic algorithm has been projected. The recently planned conventional clique constraints perform the most excellent along with the studied metrics in approximation obtainable bandwidth of flows by background traffic.

Atalay, I.C.et.al [67] proposed an accurate and non-intrusive method to estimate the residual bandwidth of an 802.11 link. Inputs from neighboring network activity measurements and from a basic collision detection mechanism are fed to the analytical model so that the proposed algorithm calculates the maximum allowable traffic level for this link. The researchers evaluate the efficiency of the method via OPNET simulations, and show that the percent estimation error is significantly lower than two other prominent estimation methods, bounded only between 2.5-7.5%. They also demonstrate that flow admission control is successfully achieved in a realistic WMN scenario. Flow control through their proposed algorithm keeps the unsatisfied traffic demand bounded and at a negligibly low level, which is less than an order of magnitude of the other two methods.

Sulthani, R.M. and Rao, D.S. [68] proposed the look of an ascendible and reliable QoS design for mobile ad-hoc networks, that consists of A. a multi path routing protocol, B. a call admission control (CAC) theme and C. a congestion managing mechanism. The multi path routing protocol exploits removal code method for industrialized replicated fragments for every packet, to reinforce irresponsibleness. Necessary fragments are sent through the methods with robust property and high delivery likelihood. Whereas it receives Associate in Nursing assured variety of fragments, destination will recover the initial packet. In their CAC theme, they admit the calls supported the information measure accessibility of the trail. To avoid performance degradation thanks to mobility-triggered congestion, a congestion management mechanism has been developed. Once congestion happens, the most effective effort traffic is rate controlled, to free information measure for the period of time flows. In these schemes along create the planned QoS design ascendible to massive network size and quality. By simulation results, they show that this design permits U.S.A. to supply reliable QoS in ad-hoc networks, will increase the out there information measure, performs load leveling within the network and will increase period of time.

Nourazar, S. and Dehghan, M [69] focused on one critical issue in mobile ad hoc networks that is multicast routing and propose a mesh based "on demand" multicast routing protocol for ad-hoc networks with QoS (quality of service) support. The proposed scheme has four key features: (a) it is based on the forwarding group concept (i.e., a subset of nodes is in charge of forwarding the multicast packets); (b) it dynamically refreshes the forwarding group members using a procedure similar to on demand routing;(c) it significantly reduces control overhead, and make the scalability of multicast routing protocol possible in mobile ad hoc networks by consolidation of control packets;(d) it support QoS routing using good estimation of available and required bandwidth, and reserving required bandwidth on the end to end active routes in multicast mode.

Kajioka, S. et.al [70] proposed a new routing mechanism to support real-time multimedia communication by efficiently utilize the limited wireless network capacity. Their mechanism considers a wireless ad-hoc network composed of nodes equipped with multiple network interfaces to each of which a different wireless channel can be assigned. By embedding information about channel usage in control messages of OLSRv2, each node obtains a view of topology and bandwidth information of the whole network. Then, a source node determines a logical path on which application QoS requirements are satisfied. Through experiments on a simulator, their mechanism could achieve the packet delivery ratio of about 95 % at the end-to-end delay of about 10 ms. In addition real-time traffic was more evenly distributed over the whole network.

Feng Chen et.al [71] derived a theoretical model to calculate the available bandwidth of a path and study its upper and lower bounds with background traffic. The researchers exposed the camp constraint wide accustomed construct higher bounds doesn't hold to any extent further once links are allowed to use completely different rates at different time. In their planned model, ancient camp is as well as rate vector to additional appropriately differentiate the contradictory relations amongst links within wireless detector networks wherever time-varying link adaption is employed. Supported the model, the researchers additionally investigate the matter of joint improvement of QoS routing and recommend several routing metrics. The recently planned conservative camp constraint presented the mainly effective among the studied metrics in estimating accessible information bandwidth calculate of flows with background traffic.

Kassim, M. et.al [72] presented an information measure gain Associate in analysis on communications protocol and HTTPs traffic in an information processing based mostly network. A framework model to run the analysis has been setup that caters regarding forty thousand coincident users to the web that enclosed wired and wireless access users in a very university. Every traffic flow to 1 access Virtual Local area Network (VLAN) has been designed. 5 bandwidth collectors (BC) square measure setup within the running framework. Network traffic then is filtered in step with the known policies that square measure supported variety of applications, protocols and rules. 2 main policies rules square measure designed known as the static object and customized object rules. 3 main filtered content designed that are incorporated uniform resource locator (URL) and content filtering, instant message and purpose to purpose applications and therefore the third filtered objects is internet class. The target of the traffic analysis is to look at the information measure gain within the network and manage the information measure used in step with the prioritized applications required. One hour and in some unspecified time in the future of web traffic square measure collected to research the information measure used. Information measure gain then is bestowed for the 5 setup information measure collector. Results demonstrated that the model framework helps to reduce the information measure utilization chiefly on communications protocol and https traffic. Associate in analysis on information measure gain and computer memory unit saved square measure bestowed in multiple times and proportion.

Venkatasubramanian, S. and Gopalan, N.P. [73] presented in MANETs (mobile ad hoc networks), the unbalanced transport layer as well as inhibited quantity of traffic being conceded out through the network are due to the high packet defeat rates as well as recurrent topological transform. It is necessary that at least offered bandwidth with end-to-end latency along with congestion approximately a link are included in a Quality of Service base routing metric for mobile ad hoc networks (MANETs). In this research the researchers developed a QoS supported, robust multipath routing (QRMR) protocol intended for mobile ad hoc networks to allocated weights to entity links, depended resting on the metrics link excellence, channel superiority along with end-to-end impediment. The entity link weight is joints into a routing metric to authenticate the weight balancing with interfering between links utilize the equal channel. Therefore, the traffics are balanced as well as the network capability is enhanced as the load values assist the routing procedure to avoid routing traffic during congested locale. Consequently, the assortment of the quantity of traffic to be routed to every neighbor has been prepared to present routing such that the loads of the nodes are a probable minimum. The researchers demonstrated the robustness of the protocol such as its complete increased packet delivery ratio and condensed latency, during simulation consequences.

Agbaria, A. et.al [74] proposed bandwidth management key feature for providing quality of service (QoS) in contemporary mobile ad hoc networks (MANETs). In this paper, the researchers present a novel approach to bandwidth reservation which is designed for highly mobile environments. In this scheme, a node takes into account the bandwidth requirements of its 2-hop neighbors. The design of this scheme does not depend on any routing protocol. The researchers evaluate the proposed approach by incorporating it in the well known AODV protocol. The comparison between the original AODV and its extended version, with their approach, shows that the latter achieves a significantly lower latency and higher reliability.

Alaa.M and Marwan.M. Krunz [75] presented transmission power control (TPC) has great potential to increase the throughput of a mobile ad hoc network (MANET). Existing TPC schemes achieve this goal by using additional hardware (e.g., multiple transceivers), by compromising the collision avoidance property of the channel access scheme, by creating impractical hypothesis on the operation of the Mac protocol, else through overlook the protection of link-layer recognition packets. In this paper, the researchers presented a novel power controlled MAC protocol called POWMAC, which enjoys the same single-channel, single-transceiver design of the IEEE 802.11 ad hoc MAC protocol but which achieves a significant throughput improvement over the 802.11 protocol. As an alternative of irregular among the transmission of control (RTS/CTS) as well as knowledge packets, like wipe up out the 802.11 method, POWMAC uses associate access window (AW) to permit for a series of request-to-send/clear-to-send (RTS/CTS) exchanges to require place before many synchronal knowledge packet transmissions will start. The extents of the access windows are energetically accustomed supported localized data to permit for multiple interference-limited synchronal transmissions to require place within the same neighborhood of a receiving terminal. Collision turning away data is inserted into the CTS packet and is employed to bound/ the transmission power of probably meddlesome terminals within the neighborhood of the receiver, instead of silencing such terminals.

Zhao Guo-feng et.al [76] proposed the wireless ad hoc networks (WANET) are an open system that is constituted by fix or mobile nodes. In WANET, each node can be a router or a host. Considering that most nodes may use battery as its energy, it is necessary to improve on energy-saving method. Based on the MAODV protocol, the researchers bring forward a new method called PPEF that uses both hops and energy consumption level of each node together for multicast routing.

Jing Wu et.al [77] presented in large scale MANETs, centerless clustering algorithms need to reduce topology and routing maintenance overheads by constructing a stable hierarchical topology. So attention should be focused on topology’s stability. At present, attentions are paid to the inner cluster topology’s stability, but the intercluster topology’s stability is neglected. Therefore, the researchers proposed a fully distributed clustering algorithm for MANETs in which both the inner cluster topology’s stability and the intercluster topology’s stability are concerned. The main objectives of this algorithm consist in stabilizing the topology as a long time as possible and in further reducing the topology and routing maintenance overheads. For a better comprehension of their algorithm, an explanatory example is given. To compare their algorithm to lowest ID based mobile clustering algorithm, a simulation is studied. The conclusion shows that: their algorithm is more favorable to the topology’s stability and reduces network overheads a lot, which improves the network performance.

Chee-Wah Tan and Sanjay Kumar Bose [78] proposed A MANET has a wireless network set up "on the fly" without the need of any network infrastructure to be present. As such, the mobiles nodes in a very painter have to be compelled to double up like shift nodes used for information routing. These additional transmissions are often further the energy resource of mobile nodes these area units anyhow probable are often running on confined battery power. This paper recommended and investigated a energy-aware unintentional on-demand distance vector routing protocol (PAW-AODV) for economical power routing. PAW-AODV might use the restricted power resources with efficiency because it routes supported a power-based price operate. Both AODV and PAW-AODV are simulated in various mobile situations using QUALNET. They are also subjected to the various hop count limits that the data could traverse from source to destination. Their performances in the various scenarios are then compared to reflect the relative merits of each protocol.

M. Tamilarasi & T.G. Palanivelu [79] described Energy management born out of limited battery capacity of wireless nodes is a challenge to be tackled in MANETs. In this paper, a mechanism is proposed for MANETs using on-demand routing protocols in order to maximize the lifetime of the network. This mechanism integrates two different approaches namely the load balancing approach and the transmission power control approach. The mechanism applied on standard AODV resulted in EA_AODV. From simulation results it is learnt that the EA_AODV reduces on an average the energy consumption per node by 20%, the energy consumption per packet by 20% and increases the capacity by 5%. The price paid for the improvement in these performance parameters is the 5% increase in average end-to-end delay due to the inclusion of extra information in the packet header. Though, in this paper the energy aware mechanism is applied only on AODV, it could be applied for any on demand routing protocol to get energy efficiency with improved performance.

Pinyi Ren et.al [80] presented a mobile ad-hoc network (MANET) is usually power constrained due to the limited battery energy on each node. For MANETS, energy efficiency is crucial for the design of new routing protocols. In this paper, a new energy-aware routing algorithm, called Energy Saving Ad-hoc On-demand Distance Vector (ESAODV) routing, is proposed. In the route discovery process of ESAODV, intermediate nodes estimate the current average energy of the network (CAEN) as a comparison threshold to determine how to respond to the received route request (RREQ) packets. After that, the effects of ESAODV on network performance are addressed. Analytical and simulation results show that the proposed ESAODV can effectively protect the energy-overused nodes and can greatly prolong the network lifetime.

Alok Kumar Jagadev et.al [81] presented broad accomplishment of IEEE 802.11 based networks might lead to employment of contained wireless data communication atmosphere with an incomplete number of mobile hosts, describe ad hoc networks. Implementation of an appropriate routing technique in ad hoc networks creates it competent in terms of presentation. Wide ranges of routing protocols are contributed through many researchers. Genuine time applications are mainly popular involving the applications, run by ad hoc networks. Like that applications severely add to the Quality of Service (QoS) necessities such as overall throughput, end-to end delay along with power level. Support of QoS requirements become more demanding due to dynamic nature of mobile adhoc network where mobility of nodes consequences in numerous change in topology. QoS aware routing protocols preserve provided to the QoS hold up, which highlighted on determining a path among source along with purpose with the QoS obligation of the flow being contented. The researchers proposed a protocol, known as Power and Delay aware Temporally Ordered Routing Algorithm (PDTORA), stand on Temporally Ordered Routing Algorithm (TORA) Protocol, where authentication of power as well as delay requirements has been carried out with a reservation package at every node all along the path among source and purposed.

Wanrong Yu et.al [82] presented a novel high-throughput MAC protocol, called Concurrent Transmission MAC(CTMAC), which supports concurrent transmission while allowing the network to have a simple design with a single channel, single transceiver, and single transmission power architecture. CTMAC comprised additional control gap amongst the transmission of control packets (RTS/CTS) as well as data packets (DATA/ACK), which permit a sequence of RTS/CTS interactions to acquire place among the nodes in the locality of the broadcast, or getting node to agenda probable multiple, synchronized data transmission. To safeguard the concurrent data transmission, collision avoidance information is included in the control packets and used by the neighboring nodes to determine whether they should begin their transmissions. Also, to isolate the possible interference between DATA packets and ACK packets, a new ACK sequence mechanism is proposed. Simulation results show that a significant gain in throughput can be obtained by the CTMAC protocol compared with the existing work including the IEEE 802.11 MAC protocol.

Chih-Shun Hsu et.al [83] presented QoS routing key to support multimedia services in mobile ad hoc networks (MANETs). It is known that resource reservation is one of the best techniques to guarantee QoS in MANETs. Lots of the reservation-based QoS routing protocols have been proposed before. However, the effective bandwidth calculation problem and the bandwidth reservation problem have not been addressed seriously. Here, the researchers proposed an on-demand bandwidth reservation QoS routing protocol for TDMA-based multihop MANETs. The researchers propose an algorithm to guide the destination to choose the route that is most likely to satisfy the QoS requirement and an algorithm to reserve the proper time slot and thus keeps more free time slots for other requests. Simulation results show that their protocol can achieve high route establishment probability and low packet loss rate.

Danyu Zhu et.al [84] presented several mobile devices which begin to support both cellular and IEEE 802.11 based network interfaces. Although rates are increasing, current cellular networks provide relatively low bandwidth that does not meet the QoS requirements of many high-demanding multimedia applications. In this paper, the researchers propose an integrated network architecture that utilizes both wireless interfaces to provide better QoS support by QoS Aware Wireless Bandwidth Aggregation (QAWBA). Via QAWBA, mobile nodes form a mobile ad hoc network (MANET) using their IEEE 802.11 interfaces to share their cellular link capacity. Some mobile nodes act as proxies to contribute their idle cellular links to support a QoS request that may exceed the available bandwidth of any individual mobile node. A K-path proxy discovery algorithm is proposed for fast and efficient proxy discovery. Simulation results show that QAWBA can significantly improve network utilization and the admission rate of QoS requests.

X. Chen et.al [85] proposed an innovative scheme to grant high priority to communications between some important nodes in TDMA based ad hoc networks. In addition to bandwidth reservation in previous QoS routing approaches, their scheme adopts a new approach: bandwidth prereservation. Some bandwidth is prereserved at intermediate nodes in a quadrangle-shaped area formed between important nodes. The key idea is to utilize each node's geographic location information and minimize potential scheduling conflicts for transmissions. In this way, time slot collisions in adjacent wireless links along a path can be reduced so that more high priority connections can be accepted into the network. Extensive simulations show that their scheme can successfully provide better communication quality at a relatively low price.

D.W. Kim et.al [86] proposed a novel on-demand quality-of-service (QoS) routing protocol, SBR [signal-to-interference (SIR) and bandwidth routing], which explicitly fulfills both SIR and bandwidth requirements from different multimedia users in ad hoc mobile networks. With SBR, bandwidth reservation is made by allocating time slots and SIR reservation is ensured by assigning adequate powers at the intermediate nodes between a source and a destination. The power-assignment method used in SBR supports finding routes that satisfy the SIR requirements as well as reduces the level of prevailing interference that necessarily occurs in multiple-access wireless networks. SBR also has a new backup capability of establishing multiple paths, even for a single connection, when the route search cannot find a single path that supports the QoS requirements, which contributes to reducing the probability of call denials in constructing the route due to a lack of suitable paths. Extensive simulations show that SBR significantly reduces the ratio of unsuccessful calls with modest routing overhead.

J. E. Kleider and S. Gifford [87] presented a method for time and frequency synchronization of broadband OFDM for mobile ad hoc networking systems, where each node randomly and rapidly changes location. The proposed method is robust in Rayleigh fading and is computationally tractable for low-power digital signal processor (DSP) implementations. The synchronization method uses a pseudo-noise (PN) preamble sequence, provides low probability of false detection, low probability of missed detection, and exhibits a low peak-to-average power ratio (PAPR). The researchers showed the power spectral density (PSD) of the PN-based preamble, after the digital up-converter shaping filter, fits into a spectral mask similar to that of the OFDM traffic signal's PSD. Efficient implementation is demonstrated using frequency-domain equivalent processing on a fixed-point Texas Instruments DSP and a floating-point Motorola G4 PowerPC with Altivec.

W. H. Liao et.al [88] considered the bandwidth reservation problem in a mobile ad hoc network (MANET) to support QoS (quality-of-service) routing. The researchers approach this problem by assuming a common channel shared by all hosts under a TDMA (time division multiple access) channel model. Existing solutions have addressed this problem by assuming a stronger multi-antenna model, where the bandwidth of a link is independent of the transmitting/receiving activities of its neighboring links, or a less strong CDMA-over-TDMA channel model, where the use of a time slot on a link is only dependent on the status of its one-hop neighboring links. While more practical and less costly, using a TDMA model needs to face the challenge of radio interference problems. In this paper, the researchers propose a new protocol that can reserve routes by addressing both the hidden-terminal and exposed-terminal problems. The protocol can conduct accurate bandwidth calculation while performing route discovery. Simulation results are presented to verify how this new protocol performs.

W.J. Shao et.al [89] proposed a distributed bandwidth reservation algorithm for QoS routing in mobile ad hoc networks (MANET). The bandwidth resource is organized into TDMA time slots. Previous methods either rely on global information for time slot reservation, which is impractical, or suffer from the shortcut collision problem. In their method, both the hidden terminal problem and the shortcut collision problem are eliminated. Furthermore, their method is performed in a distributed manner, thus has a low computational complexity. Simulation results show that the reserved bandwidth of their algorithm is close to the upper bound.

Chapter-3

Theoretical Background

Here in this chapter we provide the theoretical background on AdHoc networks and a research oriented discussion for existing approaches in the provisioning of QoS in wireless ad-hoc networks. The existing approaches could be categorized into the following groups: MAC QoS, QoS-aware routing, inter-layer QoS model and QoS-aware application. This chapter mainly discusses the research domain and in depth study made about the key components of Adhoc network and quality of service (QoS) in this section the concept of admission control and flow reservation have also been considered and presented.

3.1 Wireless Communication:

Wireless communication refers the process of the transfer of data between two or more points that aren't connected by any electrical conductor or the direct electrically connecting medium. Wireless operations allow services, like long-range communications, that area unit not possible or impractical to implement with the utilization of wires. The term is usually employed in the telecommunications business to facilitate telecommunications systems (e.g. radio transmitters and receivers, remote controls etc.) that use certain technique of energy (e.g. radio waves, acoustic energy, etc.) to transfer information or the data, without utilizing the connecting wires. The data or the information can be transmitted for both short length or range communication or even long distance communication.

Wireless Communication is solely a medium. Wireless Communication is concerning the tools accustomed communicated through two devices. As a subscriber to such equipment, one must realize the most effective form of wireless services that suits his wants.

3.2 Components of Wireless Communication

All the protocols which are being used for communication are having their own specification and criteria. There are few general characteristics and defined purposes which every protocol tries to obtain during its real time operations.

Few of these characteristics that the protocols try to follow have been mentioned below:

Unlimited roaming capability and operation range: In real time operations the location of the user with mobile or portable devices changes and is irrelevant. The position and status of the portable node is not dependent on the distance whether it is near or far away. The protocol needs to be adapted so as to communicate uninterrupted and data can be sent and received.

Assurance of data delivery: All messages and data information is sure to be delivered in spite of wherever a user is found or the user’s standing. Though the transportable device is turned off, once it's turned on once more, the user can obtain the new message.

Dependability of Delivery: The authenticity and originality of every data or information has to be assured.

Notification: It has the responsibility to notify the subscriber that data is sent successfully and it is



rev

Our Service Portfolio

jb

Want To Place An Order Quickly?

Then shoot us a message on Whatsapp, WeChat or Gmail. We are available 24/7 to assist you.

whatsapp

Do not panic, you are at the right place

jb

Visit Our essay writting help page to get all the details and guidence on availing our assiatance service.

Get 20% Discount, Now
£19 £14/ Per Page
14 days delivery time

Our writting assistance service is undoubtedly one of the most affordable writting assistance services and we have highly qualified professionls to help you with your work. So what are you waiting for, click below to order now.

Get An Instant Quote

ORDER TODAY!

Our experts are ready to assist you, call us to get a free quote or order now to get succeed in your academics writing.

Get a Free Quote Order Now